Preview

Bis 220 Final Exam Study Guide

Good Essays
Open Document
Open Document
946 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Bis 220 Final Exam Study Guide
BIS 220 Final Exam Study Guide
1) Two information systems that support the entire organization are
A. enterprise resource planning systems and dashboards
B. transaction processing systems and office automation systems C. enterprise resource planning systems and transaction processing systems
D. expert systems and office automation systems
2) _______ is the direct use of information systems by employees in their work
A. Transaction processing systems B. End-user computing
C. Decision support systems
D. Management information systems
3) ______ attempt to duplicate the work of human experts by applying reasoning capabilities A. Expert systems
B. Dashboards
C. Business intelligence systems
D. Decision support systems
4) ______ issues involve who may obtain information and how much they should pay for this information
A. Privacy B. Accessibility
C. Property
D. Transferability
5) _____ issues involve collecting, storing, and disseminating information about individuals. A. Privacy
B. Accuracy
C. Property
D. Accessibility
6) Your company’s computers have been taken over by an attacker and used to attack another organization’s information systems. Your problem is which of the following?
A. Poor security policies and procedures
B. Lack of due diligence C. Downstream liability
D. Poor service-level agreements
7) You are the only person in your office to upgrade to Microsoft® Word 2010. Before you share documents with coworkers, you should do which of the following?
A. Print out a backup copy of documents
B. Run the Compatibility Checker
C. Burn all documents to CD
D. Create a document summary
8) Which of the following is detected by the contextual spelling checker?
A. Duplicate words
B. Irregular capitalization
C. Use of their when you should use there
D. Improper use of commas and other punctuation
9) If your cursor is near the bottom of a page and you want to display the next paragraph you type at the top of a new page, you should

You May Also Find These Documents Helpful

  • Satisfactory Essays

    BCMB230 exam 1 spring14

    • 1607 Words
    • 7 Pages

    3. Using the information presented in lecture which of the following is most likely to be the source…

    • 1607 Words
    • 7 Pages
    Satisfactory Essays
  • Good Essays

    Bis 312 Case Study

    • 886 Words
    • 4 Pages

    3. Discuss the current manager 's ability to perform the functions of planning, organizing, directing, and controlling.…

    • 886 Words
    • 4 Pages
    Good Essays
  • Good Essays

    3. According to R.J. Rummel’s book series, how many men, women and children were killed by the state between 1900-1987?…

    • 724 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Bus 210 Week 2 Study Guide

    • 1147 Words
    • 5 Pages

    | (TCO 10) This was NOT among the list of traits and factors in long-term happy marriages described in your textbook.…

    • 1147 Words
    • 5 Pages
    Satisfactory Essays
  • Powerful Essays

    BIS261 Final Exam Paper

    • 1552 Words
    • 7 Pages

    The articles from the DeVry University Library: Managing Virtual Teams by LaBrosse; Successfully Transitioning to a Virtual Organization by Lockwood; and Technology Support for Enhanced Productivity in International Virtual Teams by Seilheimer, Ishman, & Seilheimer…

    • 1552 Words
    • 7 Pages
    Powerful Essays
  • Satisfactory Essays

    DQ1: What are some emerging technologies available in the marketplace today? How can we benefit from them?…

    • 416 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    BUS 490 Study guide 2

    • 1622 Words
    • 5 Pages

    1. Matching is the key to effectively generating feasible alternative strategies for a company. Matching stage of the strategy-formulation framework consists of five techniques that can be used in any sequence: the Strengths-Weaknesses-Opportunities-Threats (SWOT) Matrix, the SPACE Matrix, the BCG Matrix, the IE Matrix and the Grand Strategy Matrix. These tools rely on information derived from the input stage to match external opportunities and threats within internal strengths and weaknesses. The first is the SO Strategies; it uses a firm’s internal strengths to take advantage of external opportunities. The WO strategy. This strategy aims at improving internal weaknesses by taking advantage of external opportunities. ST Strategies uses a firm’s internal strengths to avoid or reduce the impact of external threats. The last strategy to use is the WT strategy. Defensive tactics directed at reducing internal weaknesses and avoiding external threats is used in this strategy. Examples: 1)JPMorgan chase has a strong brand name and financial position(Strength). They could use that to expand into other countries. 2) Another JPmorgan chase example would be if they decided to use their assets to acquire a competitor and take control of a major percentage of the industry. 3) Strong R&D expertise (internal Strength) and decreasing number of younger adults (external threat)= develop new products for elderly…

    • 1622 Words
    • 5 Pages
    Powerful Essays
  • Powerful Essays

    I declare that this assessment is my own work and where my work is supported by documents from my…

    • 2178 Words
    • 10 Pages
    Powerful Essays
  • Satisfactory Essays

    Bis 220 Week 1 Checkpoint

    • 603 Words
    • 3 Pages

    This week we are to pick two information technology acts to research and discuss the advances in information technology that resulted in new ethical issues that created the act. I currently work as a teller for a local bank and have chosen to research and discuss the Electronic Funds Transfer Act of 1978 and Fair Credit Reporting Act of 1970. I chose both of these because they coincide with my current job.…

    • 603 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    1. Discuss common forms of attack on Microsoft systems using the text Internet, and/or your job as reference for full credit.…

    • 488 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Bis/220 Proposal

    • 315 Words
    • 2 Pages

    Microsoft Access is a system that allows users to manipulate large amounts of data. The different areas and features of Microsoft provide quick learning and easy to use software which can benefit both small and large business environments. The different parts that make up Access are queries, reports, tables, modules and macros. Queries allow the user to pull information from the given tables and calculate using the information filled into the table. Tables associated with Access are used to store data. Information on the tables can be entered on the forms and printer-ready information is displayed on the report portion of Access, These reports can also be exported to Microsoft Excel or Word. The automation of database tasks are done using macros. Modules are used for advanced programming within the database. Microsoft Access is beneficial in the work environment because it incorporates features that are also found in other Microsoft Office applications, the learning curve with Access is not steep at all it is a very easy system to operate. Because of wizards, it is easier to create a database in less than an hour. Another benefit of Access is that it allows the user to integrate large amounts of data not having to sacrifice performance of the system. Information that has already been made available can be transferred over to the Access program. Microsoft Access can e used for both small and large business environments. However, a large office environment allows access to be programmed from the enterprise resource software.…

    • 315 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    unit 637

    • 297 Words
    • 2 Pages

    1.2. Explain the legal requirements and agreed ways of working for the security and confidentiality of information.…

    • 297 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    There are four components to an ERP system: ERP software, business processes, the users, and hardware/operating systems. The ERP software is the first component and core of the ERP system. The ERP software consists of modules and each module provides unique functionality for a specific business process. Some of the modules are accounts payable, asset accounting, financial accounting, general ledger, human resources, material management, plant maintenance, project systems, and travel management. Business processes is the next component to an ERP system. There are three levels to business processes: management control, operational control, and strategic planning. ERP streamlines and supports business processes at all three levels. The users are an important component because they input data into the ERP and use the information to make decisions. Hardware/operating systems are another vital within an ERP system. The appropriate and sufficient operating systems and hardware are necessary to support and run the ERP software…

    • 1676 Words
    • 7 Pages
    Powerful Essays
  • Powerful Essays

    The BUSN115 final exam is 3 pages long. It is a timed exam worth 250 points that you may enter only once. You have 3.5 hours to complete the exam. It consists of 25 multiple choice questions worth 6 points each. There are 7 essay questions, 6 worth 15 points and 1 worth 10 points. Be sure to save and save often while you are working on the exam, and submit the exam when you are finished.…

    • 1667 Words
    • 6 Pages
    Powerful Essays
  • Powerful Essays

    4) Transaction processing systems are most commonly used by the senior management level of an…

    • 3074 Words
    • 13 Pages
    Powerful Essays